SB2023073104 - Multiple vulnerabilities in Discourse 



SB2023073104 - Multiple vulnerabilities in Discourse

Published: July 31, 2023 Updated: December 17, 2025

Security Bulletin ID SB2023073104
Severity
Medium
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 40% Low 60%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Race condition (CVE-ID: CVE-2023-37904)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to a race condition in Accept Invite. A remote user can exploit the race and create more users than permitted from invite links.


2) Allocation of Resources Without Limits or Throttling (CVE-ID: CVE-2023-38684)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to unbounded limits in various controller actions. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.


3) Reusing a Nonce, Key Pair in Encryption (CVE-ID: CVE-2023-37467)

The vulnerability allows a remote attacker to compromise the target system. 

The vulnerability exists due to the CSP (Content Security Policy) nonce reuse issue. A remote user can bypass CSP protection. 


4) Resource exhaustion (CVE-ID: CVE-2023-38498)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources within the defer queue. A remote user can trigger resource exhaustion and perform a denial of service (DoS) attack.


5) Input validation error (CVE-ID: CVE-2023-37906)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input within the post edit reason. A remote user can edit a post in a topic and perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.